Federal Laws Related to Identity Theft

Size: px
Start display at page:

Download "Federal Laws Related to Identity Theft"

Transcription

1 Order Code RL31919 Federal Laws Related to Identity Theft Updated January 30, 2008 Gina Marie Stevens Legislative Attorney American Law Division

2 Federal Laws Related to Identity Theft Summary According to the Federal Trade Commission, identity theft is the most common complaint from consumers in all fifty states, and complaints regarding identity theft have grown for seven consecutive years. Victims of identity theft may incur damaged credit records, unauthorized charges on credit cards, and unauthorized withdrawals from bank accounts. Sometimes, victims must change their telephone numbers or even their social security numbers. Victims may also need to change addresses that were falsified by the impostor. This report provides an overview of the federal laws that could assist victims of identity theft with purging inaccurate information from their credit records and removing unauthorized charges from credit accounts, as well as federal laws that impose criminal penalties on those who assume another person s identity through the use of fraudulent identification documents. This report will be updated as events warrant.

3 Contents Introduction...1 Federal Laws Related to Identity Theft...2 Identity Theft Assumption and Deterrence Act...2 Identity Theft Penalty Enhancement Act...3 Fair Credit Reporting Act...4 Fair and Accurate Credit Transactions (FACT) Act of Fair Credit Billing Act...6 Electronic Fund Transfer Act...6 Identity Theft Task Force...7 Real ID...8

4 Federal Laws Related to Identity Theft Introduction 1 According to the Federal Trade Commission, identity theft is the most common complaint from consumers in all 50 states, and accounts for over 35% of the total number of complaints the Identity Theft Data Clearinghouse received for calendar years 2004, 2005, and In calendar year 2006, of the 674,354 complaints received, 246,035 or 36% were identity theft complaints. 2 The identity theft victim s information was misused for credit card fraud in 25% of the identity theft complaints; for phone or utilities fraud in 16% of the identity theft complaints; for bank fraud in 16% of the identity theft complaints; for employment-related fraud in 14% of the identity theft complaints; for government documents or benefits fraud in 5% of the identity theft complaints; for loan fraud in 5% of the identity theft complaints; and other types of identity theft fraud made up 24% of the complaints. As a result of identity theft, victims may incur damaged credit records, unauthorized charges on credit cards, and unauthorized withdrawals from bank accounts. 3 Sometimes, victims must change their telephone numbers or even their social security numbers. Victims may also need to change addresses that were falsified by the impostor. With media reports of data security breaches increasing, concerns about new cases of identity theft are widespread. 4 This report provides an overview of the federal laws that could assist victims of identity theft with purging inaccurate information from their credit records and removing unauthorized charges from credit accounts, as well as federal laws that impose criminal penalties on those who assume another person s identity through the use of fraudulent identification documents. 5 This report will be updated as warranted. 1 This report was originally prepared by Angie A. Welborn, Legislative Attorney. 2 Federal Trade Commission, Identity Theft Victim Complaint Data, Feb. 7, 2007, at [ 3 See Nancy Trejos, Identity Theft Gets Personal: When a Debit Card Number Is Stolen, America s New Crime Wave Hits Home, Washington Post at F01 (Jan. 13, 2008). 4 Legislation that has been introduced in response to the increase in information security breaches is discussed in CRS Report RL33273, Data Security: Federal Legislative Approaches, by Gina Marie Stevens. 5 For information on state identity theft laws, see National Conference of State Legislators, Identity Theft Statutes & Criminal Penalties, at [ idt-statutes.htm].

5 CRS-2 Federal Laws Related to Identity Theft Identity Theft Assumption and Deterrence Act. While not exclusively aimed at consumer identity theft, the Identity Theft Assumption Deterrence Act prohibits fraud in connection with identification documents under a variety of circumstances. 6 Certain offenses under the statute relate directly to consumer identity theft, and impostors could be prosecuted under the statute. For example, the statute makes it a federal crime, under certain circumstances, 7 to knowingly and without lawful authority produce an identification document, 8 authentication feature, 9 or false identification document; 10 or to knowingly possess an identification document that is or appears to be an identification document of the United States which is stolen or produced without lawful authority knowing that such document was stolen or 6 18 U.S.C The statute lists several actions that constitute fraud in connection with identification documents. However, for the purposes of this report, they do not all relate to consumer-related identity theft, i.e. situations where a consumer s Social Security number or driver s license number may be stolen and used to establish credit accounts by an impostor. 7 According to the statute, the prohibitions listed apply when the identification document or false identification document is or appears to be issued by or under the authority of the United States or the document-making implement is designed or suited for making such an identification document or false identification document; the document is presented with the intent to defraud the United States; or either the production, transfer, possession, or use prohibited by this section is in or affects interstate or foreign commerce, including the transfer of a document by electronic means, or the means of identification, identification document, false identification document, or document-making implement is transported in the mail in the course of the production, transfer, possession, or use prohibited by this section. 18 U.S.C. 1028(c). 8 Identification document is defined as a document made or issued by or under the authority of the United States Government, a State, political subdivision of a State, a foreign government, political subdivision of a foreign government, an international governmental or an internal quasi-governmental organization which, when completed with information concerning a particular individual, is of a type intended or commonly accepted for the purpose of identification of individuals. 18 U.S.C. 1028(d)(3). Identification documents include Social Security cards, birth certificates, driver s licenses, and personal identification cards. 9 Authentication feature is defined as any hologram, watermark, certification, symbol, code, image, sequence of numbers or letters, or other feature that either individually or in combination with another feature is used by the issuing authority on an identification document, document-making implement, or means of identification to determine if the document is counterfeit, altered, or otherwise falsified. 18 U.S.C. 1028(d)(1). 10 False identification document means a document of a type intended or commonly accepted for the purposes of identification of individuals that (A) is not issued by or under the authority of a governmental entity or was issued under the authority of a governmental entity but was subsequently altered for purposes of deceit; and (B) appears to be issued by or under the authority of the United States Government, a State, a political subdivision of a State, a foreign government, a political subdivision of a foreign government, or an international governmental or quasi-governmental organization. 18 U.S.C. 1028(d)(4).

6 CRS-3 produced without such authority. 11 It is also a federal crime to knowingly transfer or use, without lawful authority, a means of identification 12 of another person with the intent to commit, or aid or abet, any unlawful activity that constitutes a violation of federal law, or that constitutes a felony under any applicable state or local law. 13 The punishment for offenses involving fraud related to identification documents varies depending on the specific offense and the type of document involved. 14 For example, a fine or imprisonment of up to 15 years may be imposed for using the identification of another person with the intent to commit any unlawful activity under state law, if, as a result of the offense, the person committing the offense obtains anything of value totaling $1,000 or more during any one-year period. 15 Other offenses carry terms of imprisonment up to three years. 16 However, if the offense is committed to facilitate a drug trafficking crime or in connection with a crime of violence, the term of imprisonment could be up to twenty years. 17 Offenses committed to facilitate an action of international terrorism are punishable by terms of imprisonment up to twenty-five years. 18 Identity Theft Penalty Enhancement Act. The Identity Theft Penalty Enhancement Act was signed on July 15, 2004, (P.L ). The act amends Title 18 of the United States Code to define and establish penalties for aggravated identity theft and makes changes to the existing identity theft provisions of Title 18. Under the law, aggravated identity theft occurs when a person knowingly transfers, possess, or uses, without lawful authority, a means of identification of another person during and in relation to the commission of certain enumerated felonies U.S.C. 1028(a)(1) and (2). 12 Means of identification is defined as any name or number that may be used, alone or in conjunction with any other information, to identify a specific individual, including any (A) name, social security number, date of birth, official State or government issued driver s license or identification number, alien registration number, government passport number, employer or taxpayer identification number; (B) unique biometric data, such as fingerprint, voice print, retina or iris image, or other unique physical representation; (C) unique electronic identification number, address, or routing code; or (D) telecommunication identifying information or access device (as defined in section 1029(e)). 18 U.S.C. 1028(d)(7) U.S.C. 1028(a)(7) U.S.C. 1028(b) U.S.C. 1028(b)(1)(D) U.S.C. 1028(b)(2) U.S.C. 1028(b)(3) U.S.C. 1028(b)(4). 19 P.L , Sec. 2, to be codified at 18 U.S.C. 1028A. Offenses that could give rise to aggravated identity theft are enumerated in this section, and include offenses relating to theft of public money, property, or rewards; theft, embezzlement, or misapplication by a bank officer or employee; theft from employee benefit plans; false personation of citizenship; false statements in connection with the acquisition of a firearm; mail, bank, and wire fraud; (continued...)

7 CRS-4 The penalty for aggravated identity theft is a term of imprisonment of two years in addition to the punishment provided for the original felony committed. Offenses committed in conjunction with certain terrorism offenses are subject to an additional term of imprisonment of five years. The act also directs the United States Sentencing Commission to review and amend its guidelines and its policy statements to ensure that the guideline offense levels and enhancements appropriately punish identity theft offenses involving an abuse of position adhering to certain requirements outlined in the legislation. 20 In addition to increasing penalties for identity theft, the act authorized appropriations to the Justice Department for the investigation and prosecution of identity theft and related credit card and other fraud cases constituting felony violations of law, $2,000,000 for FY2005 and $2,000,000 for each of the 4 succeeding fiscal years. 21 Fair Credit Reporting Act. While the Fair Credit Reporting Act (FCRA) does not directly address identity theft, it could offer victims assistance in having negative information resulting from unauthorized charges or accounts removed from their credit files. 22 The purpose of the FCRA is to require that consumer reporting agencies adopt reasonable procedures for meeting the needs of commerce for consumer credit, personnel, insurance, and other information in a manner which is fair and equitable to the consumer, with regard to the confidentiality, accuracy, relevancy, and proper utilization of such information. 23 The FCRA outlines a consumer s rights in relation to his or her credit report, as well as permissible uses for credit reports and disclosure requirements. In addition, the FCRA imposes a duty on consumer reporting agencies to ensure that the information they report is accurate, and requires persons who furnish information to ensure that the information they furnish is accurate. The FCRA allows consumers to file suit for violations of the act, which could include the disclosure of inaccurate information about a consumer by a credit reporting agency. 24 A consumer who is a victim of identity theft could file suit against a credit reporting agency for the agency s failure to verify the accuracy of information contained in the report and the agency s disclosure of inaccurate information as a result of the consumer s stolen identity. Under the FCRA, as recently amended, a consumer may file suit not later than the earlier of two years 19 (...continued) obtaining consumer information by false pretenses; and certain immigration violations. The list of enumerated offenses will be codified at 18 U.S.C. 1028A(c). 20 P.L , Sec P.L , Sec For more information on a consumer s rights under the FCRA, see CRS Report RL31666, Fair Credit Reporting Act: Rights and Responsibilities, by Margaret Lee U.S.C. 1681(b) U.S.C. 1681n; 15 U.S.C. 1681o.

8 CRS-5 after the date of discovery by the plaintiff of the violation that is the basis for such liability, or five years after the date on which the violation occurred. 25 Fair and Accurate Credit Transactions (FACT) Act of The FACT Act, signed on December 4, 2003, includes, inter alia, a number of amendments to the Fair Credit Reporting Act aimed at preventing identity theft and assisting victims. 26 Generally, these new provisions mirror laws passed by state legislatures and create a national standard for addressing consumer concerns with regard to identity theft and other types of fraud. 27 Credit card issuers, who operate as users of consumer credit reports, are required, under a new provision of the FCRA, to follow certain procedures when the issuer receives a request for an additional or replacement card within a short period of time following notification of a change of address for the same account. 28 In a further effort to prevent identity theft, other new provisions require the truncation of credit card account numbers on electronically printed receipts, 29 and, upon request, the truncation of social security numbers on credit reports provided to a consumer. 30 Consumers who have been victims of identity theft, or expect that they may become victims, are now able to have fraud alerts placed in their files. 31 Pursuant to the new provisions, a consumer may request a fraud alert from one consumer reporting agency and that agency is required to notify the other nationwide consumer reporting agencies of the existence of the alert. In general, fraud alerts are to be maintained in the file for 90 days, but a consumer may request an extended alert which is maintained for up to seven years. The fraud alert becomes a part of the consumer s credit file and is thus passed along to all users of the report. The alert must also be included with any credit score generated using the consumer s file, and must be referred to other consumer reporting agencies. 32 In addition to the fraud alert, victims of identity theft may also have information resulting from the crime blocked from their credit reports. 33 After the receipt of appropriate proof of the identity of the consumer, a copy of an identity theft report, the identification of the alleged fraudulent information, and a statement by the 25 P.L , Section P.L For effective dates, see 68 FR and 68 FR (December 24, 2003). 27 Generally, many of these new federal provisions preempt similar state laws. For more information on the preemptive effects of the Fair Credit Reporting Act, see CRS Report RS21449, Fair Credit Reporting Act: Preemption of State Law, by Angie A. Welborn. 28 P.L , Section P.L , Section P.L , Section P.L , Section P.L , Section P.L , Section 152.

9 CRS-6 consumer that the information is not information relating to any transaction conducted by the consumer, a consumer reporting agency must block all such information from being reported and must notify the furnisher of the information in question that it may be the result of identity theft. Requests for the blocking of information must also be referred to other consumer reporting agencies. 34 Victims of identity theft are also allowed to request information about the alleged crime. A business entity is required, upon request and subject to verification of the victim s identity, to provide copies of application and business transaction records evidencing any transaction alleged to be a result of identity theft to the victim or to any law enforcement agency investigating the theft and authorized by the victim to take receipt of the records in question. 35 Fair Credit Billing Act. The Fair Credit Billing Act (FCBA) is not an identity theft statute per se, but it does provide consumers with an opportunity to receive an explanation and proof of charges that may have been made by an impostor and to have unauthorized charges removed from their accounts. The purpose of the FCBA is to protect the consumer against inaccurate and unfair credit billing and credit card practices. 36 The law defines and establishes a procedure for resolving billing errors in consumer credit transactions. For purposes of the FCBA, a billing error includes unauthorized charges, charges for goods or services not accepted by the consumer or delivered to the consumer, and charges for which the consumer has asked for an explanation or written proof of purchase. 37 Under the FCBA, consumers are able to file a claim with the creditor to have billing errors resolved. Until the alleged billing error is resolved, the consumer is not required to pay the disputed amount, and the creditor may not attempt to collect, any part of the disputed amount, including related finance charges or other charges. 38 The act sets forth dispute resolution procedures and requires an investigation into the consumer s claims. If the creditor determines that the alleged billing error did occur, the creditor is obligated to correct the billing error and credit the consumer s account with the disputed amount and any applicable finance charges. 39 Electronic Fund Transfer Act. Similar to the Fair Credit Billing Act, the Electronic Fund Transfer Act is not an identity theft statute per se, but it does provide consumers with a mechanism for challenging unauthorized transactions and having their accounts recredited in the event of an error. The purpose of the Electronic Fund Transfer Act (EFTA) is to provide a basic framework establishing the rights, 34 P.L , Section P.L , Section U.S.C. 1601(a) U.S.C. 1666(b); 12 C.F.R (a) U.S.C. 1666(c); 12 C.F.R (d)(1) U.S.C. 1666(a); 12 C.F.R (e).

10 CRS-7 liabilities, and responsibilities of participants in electronic fund transfer systems. 40 Among other things, the EFTA limits a consumer s liability for unauthorized electronic fund transfers. If the consumer notifies the financial institution within two business days after learning of the loss or theft of a debt card or other device used to make electronic transfers, the consumer s liability is limited to the lesser of $50 or the amount of the unauthorized transfers that occurred before notice was given to the financial institution. 41 Additionally, financial institutions are required to provide a consumer with documentation of all electronic fund transfers initiated by the consumer from an electronic terminal. If a financial institution receives, within 60 days after providing such documentation, an oral or written notice from the consumer indicating the consumer s belief that the documentation provided contains an error, the financial institution must investigate the alleged error, determine whether an error has occurred, and report or mail the results of the investigation and determination to the consumer within 10 business days. 42 The notice from the consumer to the financial institution must identify the name and account number of the consumer; indicate the consumer s belief that the documentation contains an error and the amount of the error; and set forth the reasons for the consumer s belief that an error has occurred. 43 In the event that the financial institution determines that an error has occurred, the financial institution must correct the error within one day of the determination in accordance with the provisions relating to the consumer s liability for unauthorized charges. 44 The financial institution may provisionally recredit the consumer s account for the amount alleged to be in error pending the conclusion of its investigation and its determination of whether an error has occurred, if it is unable to complete the investigation within 10 business days. 45 Identity Theft Task Force The President s Identity Theft Task Force reported its final recommendations April 2007, and recommended a plan that is intended to harness government resources to crack down on the criminals who traffic in stolen identities, strengthen efforts to protect the personal information, help law enforcement officials investigate and prosecute identity thieves, help educate consumers and businesses about protecting themselves, and increase the safeguards on personal data entrusted to federal agencies and private entities. 46 The Plan focuses on improvements in four key areas: keeping sensitive consumer data from identity thieves through better data U.S.C. 1693(b) U.S.C. 1693g(a), 12 C.F.R (b)(1) U.S.C. 1693f(a), 12 C.F.R (b) and (c). 43 Id U.S.C. 1693f(b) U.S.C. 1693f(c), 12 C.F.R (c). 46 The President s Identity Theft Task Force, Combating Identity Theft: A Strategic Plan, April 2007 at [

11 CRS-8 security and education; making it more difficult for identity thieves who obtain consumer data; assisting the victims of identity theft in recovering from the crime; and deterring identity theft by more aggressive prosecution and punishment. Several recommendations made by the Task Force are aimed at closing the gaps in federal criminal statutes used to prosecute identity theft-related offenses to ensure increased federal prosecution. They are as follows: 47! Amend the identity theft and aggravated identity theft statutes to ensure that identity thieves who misappropriate information belonging to corporations and organizations can be prosecuted! Add new crimes to the list of predicate offenses for aggravated identity theft offenses! Amend the statute that criminalizes the theft of electronic data by eliminating the current requirement that the information must have been stolen through interstate communications! Penalize creators and distributors of malicious spyware and keyloggers! Amend the cyber-extortion statute to cover additional, alternate types of cyber-extortion! Ensure that an identity thief s sentence can be enhanced when the criminal conduct affects more than one victim Real ID In accordance with the REAL ID Act of 2005, on January 11, 2008, the Department of Homeland Security (DHS) published the final rule for State-issued driver s licenses and identification cards that federal agencies would accept for official purposes on or after May 11, 2008, in accordance with the REAL ID Act of The Real ID Rule establishes standards to meet the minimum requirements of the REAL ID Act. 49 These standards involve a number of aspects of the process used to issue identification documents, including information and security features that must be incorporated into each card; proof of identity and U.S. citizenship or legal status of an applicant; verification of the source documents provided by an applicant; and security standards for the offices that issue licenses and identification cards. All states submitting requests will receive extensions until December 31, In addition, states that meet certain benchmarks for the security of their credentials and licensing and identification processes will be able to obtain a second extension until May 10, The Rule extends the enrollment time period to allow states determined by DHS to be in compliance with the act to replace all licenses intended for official purpose with REAL ID-compliant cards by December 1, 2014, for people born after December 1, 1964, and by December 1, 2017, for those born on or before December 1, The rule is effective March 31, Id. at F.R (Jan. 29, 2008). 49 See Department of Homeland Security, REAL ID Final Rule: Questions & Answers at [

Section 1028 - Fraud and related activity in connection with identification documents and information

Section 1028 - Fraud and related activity in connection with identification documents and information TITLE 18 > PART I > CHAPTER 47 > Sec. 1028. IDENTITY THEFT Section 1028 - Fraud and related activity in connection with identification documents and information (a) (4) (5) (6) Whoever, in a circumstance

More information

CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008

CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008 CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008 Current Laws: A person commits identity theft when he intentionally

More information

WISCONSIN IDENTITY THEFT RANKING BY STATE: Rank 15, 175.9 Complaints Per 100,000 Population, 9852 Complaints (2007) Updated January 16, 2009

WISCONSIN IDENTITY THEFT RANKING BY STATE: Rank 15, 175.9 Complaints Per 100,000 Population, 9852 Complaints (2007) Updated January 16, 2009 WISCONSIN IDENTITY THEFT RANKING BY STATE: Rank 15, 175.9 Complaints Per 100,000 Population, 9852 Complaints (2007) Updated January 16, 2009 Current Laws: It is unlawful to intentionally use or attempt

More information

COLORADO IDENTITY THEFT RANKING BY STATE: Rank 8, 89.0 Complaints Per 100,000 Population, 4328 Complaints (2007) Updated November 28, 2008

COLORADO IDENTITY THEFT RANKING BY STATE: Rank 8, 89.0 Complaints Per 100,000 Population, 4328 Complaints (2007) Updated November 28, 2008 COLORADO IDENTITY THEFT RANKING BY STATE: Rank 8, 89.0 Complaints Per 100,000 Population, 4328 Complaints (2007) Updated November 28, 2008 Current Laws: A person commits identity theft if he or she: Knowingly

More information

Chapter 15.00 IDENTITY AND ACCESS DEVICE CRIMES. Table of Instructions

Chapter 15.00 IDENTITY AND ACCESS DEVICE CRIMES. Table of Instructions Chapter 15.00 IDENTITY AND ACCESS DEVICE CRIMES Table of Instructions Introduction Instruction 15.01 Fraud and Related Activity in Connection with Identification Documents, Authentication Features, and

More information

RHODE ISLAND IDENTITY THEFT RANKING BY STATE: Rank 34, 56.0 Complaints Per 100,000 Population, 592 Complaints (2007) Updated January 5, 2009

RHODE ISLAND IDENTITY THEFT RANKING BY STATE: Rank 34, 56.0 Complaints Per 100,000 Population, 592 Complaints (2007) Updated January 5, 2009 RHODE ISLAND IDENTITY THEFT RANKING BY STATE: Rank 34, 56.0 Complaints Per 100,000 Population, 592 Complaints (2007) Updated January 5, 2009 Current Laws: A person commits the crime of identity fraud if

More information

MANDATORY MINIMUM PENALTIES FOR IDENTITY THEFT OFFENSES

MANDATORY MINIMUM PENALTIES FOR IDENTITY THEFT OFFENSES Chapter 11 MANDATORY MINIMUM PENALTIES FOR IDENTITY THEFT OFFENSES A. INTRODUCTION This chapter analyzes the application of mandatory minimum penalties for identity theft offenses. First, this chapter

More information

MEMORANDUM FOR ASSISTANT REGIONAL COUNSEL (CRIMINAL TAX) SUBJECT: Identity Theft and Assumption Deterrence Act of 1998

MEMORANDUM FOR ASSISTANT REGIONAL COUNSEL (CRIMINAL TAX) SUBJECT: Identity Theft and Assumption Deterrence Act of 1998 INTERNAL REVENUE SERVICE UIL: 9999.92-00 Number: 199911041 Release Date: 3/19/1999 CTMonica January 22, 1999 MEMORANDUM FOR ASSISTANT REGIONAL COUNSEL (CRIMINAL TAX) FROM: Barry J. Finkelstein Assistant

More information

CYBERCRIME LAWS OF THE UNITED STATES Compiled October 2006 by Al Rees, CCIPS

CYBERCRIME LAWS OF THE UNITED STATES Compiled October 2006 by Al Rees, CCIPS CYBERCRIME LAWS OF THE UNITED STATES Compiled October 2006 by Al Rees, CCIPS Table of Contents Substantive cybercrime laws (e.g., laws prohibiting online identity theft, hacking, intrusion into computer

More information

FEDERAL IDENTITY THEFT TASK FORCE. On May 10, 2006, the President signed an Executive Order establishing an Identity Theft

FEDERAL IDENTITY THEFT TASK FORCE. On May 10, 2006, the President signed an Executive Order establishing an Identity Theft FEDERAL IDENTITY THEFT TASK FORCE Attorney General Alberto Gonzales Federal Trade Commission Chairman Deborah Platt Majoras On May 10, 2006, the President signed an Executive Order establishing an Identity

More information

Weber Human Services Identity Theft Prevention Policy

Weber Human Services Identity Theft Prevention Policy Weber Human Services Identity Theft Prevention Policy Purpose: Weber Human Services (WHS) is committed to protecting the privacy of the Protected Health Information ( PHI ) of our clients and the Personal

More information

MARYLAND IDENTITY THEFT RANKING BY STATE: Rank 10, 85.8 Complaints Per 100,000 Population, 4821 Complaints (2007) Updated January 29, 2009

MARYLAND IDENTITY THEFT RANKING BY STATE: Rank 10, 85.8 Complaints Per 100,000 Population, 4821 Complaints (2007) Updated January 29, 2009 MARYLAND IDENTITY THEFT RANKING BY STATE: Rank 10, 85.8 Complaints Per 100,000 Population, 4821 Complaints (2007) Updated January 29, 2009 Current Laws: A person may not knowingly, willfully, and with

More information

Issue Brief. Arizona State Senate IDENTITY THEFT AND CONSUMER PROTECTION INTRODUCTION IDENTITY THEFT. September 17, 2015.

Issue Brief. Arizona State Senate IDENTITY THEFT AND CONSUMER PROTECTION INTRODUCTION IDENTITY THEFT. September 17, 2015. Arizona State Senate Issue Brief September 17, 2015 Note to Reader: The Senate Research Staff provides nonpartisan, objective legislative research, policy analysis and related assistance to the members

More information

http://www.ftc.gov/bcp/edu/microsites/idtheft/index.html

http://www.ftc.gov/bcp/edu/microsites/idtheft/index.html Identity Theft: Steps to Take if You are a Victim We understand the stress, time and effort required as a result of having your identity stolen and used fraudulently. While there are many resources available

More information

PENNSYLVANIA IDENTITY THEFT RANKING BY STATE: Rank 14, 72.5 Complaints Per 100,000 Population, 9016 Complaints (2007) Updated January 29, 2009

PENNSYLVANIA IDENTITY THEFT RANKING BY STATE: Rank 14, 72.5 Complaints Per 100,000 Population, 9016 Complaints (2007) Updated January 29, 2009 PENNSYLVANIA IDENTITY THEFT RANKING BY STATE: Rank 14, 72.5 Complaints Per 100,000 Population, 9016 Complaints (2007) Updated January 29, 2009 Current Laws: A person commits the offense of identity theft

More information

Identity Theft Victim s Packet

Identity Theft Victim s Packet Identity Theft Victim s Packet Information and Instructions This packet is to be completed once you have contacted the Lafayette County Sheriff s Department and obtained a report number related to your

More information

Lake County Sheriff s Office Identity Theft/Fraud Packet

Lake County Sheriff s Office Identity Theft/Fraud Packet Gary S. Borders, Sheriff Lake County Sheriff s Office Identity Theft/Fraud Packet Information and Instructions The Information and Instructions portion of this packet is for you to keep and contains information

More information

Identity Theft Victim s Packet

Identity Theft Victim s Packet Identity Theft Victim s Packet In this packet: Information and Instructions Section 1, # of pages 6 Fair and Accurate Credit Transactions Act of 2003 Section 2, # of pages 3 ID Theft Affidavit Section

More information

How To Get A Credit Card From A Fraudulent Account

How To Get A Credit Card From A Fraudulent Account Information and Instructions This packet is to be completed once you have contacted New York State University Police and obtained a police report number related to your identity theft case. To obtain a

More information

Identity Theft Victim s Packet

Identity Theft Victim s Packet Identity Theft Victim s Packet Information and Instructions This packet is to be completed once you have contacted Lake Oswego Police Department and obtained a police report number related to your identity

More information

CITY OF ROCHESTER, MINNESOTA POLICE DEPARTMENT

CITY OF ROCHESTER, MINNESOTA POLICE DEPARTMENT CITY OF ROCHESTER, MINNESOTA POLICE DEPARTMENT 101 4 TH Street Southeast Rochester, Minnesota 55904-3761 507-328-6800 Fax 507-328-6975 To: From: Subject: Identity Theft and Internet Crime Victims Rochester

More information

ROCKWALL POLICE DEPARTMENT CRIMINAL INVESTIGATIONS DIVISION 205 W. Rusk St. Rockwall, Texas 75087 (972) 771-7716

ROCKWALL POLICE DEPARTMENT CRIMINAL INVESTIGATIONS DIVISION 205 W. Rusk St. Rockwall, Texas 75087 (972) 771-7716 ROCKWALL POLICE DEPARTMENT CRIMINAL INVESTIGATIONS DIVISION 205 W. Rusk St. Rockwall, Texas 75087 (972) 771-7716 Identity Theft Information and Affidavit RPD Case # - The attached Identity Theft Affidavit

More information

West Palm Beach Police Department s Identity Theft Victim s Packet

West Palm Beach Police Department s Identity Theft Victim s Packet West Palm Beach Police Department s Identity Theft Victim s Packet Information and Instructions This packet should be completed once you have contacted West Palm Beach Police Department and obtained a

More information

Lake Havasu City. Identity Theft Prevention Program

Lake Havasu City. Identity Theft Prevention Program Lake Havasu City Identity Theft Prevention Program Effective beginning May 1, 2009 I. PROGRAM ADOPTION Lake Havasu City (City) developed this Identity Theft Prevention Program (Program) pursuant to the

More information

San Antonio Police Department FORGERY DETAIL 315 S. Santa Rosa SAN ANTONIO, TX 78207 (210)-207-7451 OFFICE (210)-207-4070 FAX

San Antonio Police Department FORGERY DETAIL 315 S. Santa Rosa SAN ANTONIO, TX 78207 (210)-207-7451 OFFICE (210)-207-4070 FAX San Antonio Police Department FORGERY DETAIL 315 S. Santa Rosa SAN ANTONIO, TX 78207 (210)-207-7451 OFFICE (210)-207-4070 FAX Identity Theft Packet SAPD case # Assigned Detective: The San Antonio Police

More information

Plymouth Township Police Department s Identity Theft Victim s Packet

Plymouth Township Police Department s Identity Theft Victim s Packet Plymouth Township Police Department s Identity Theft Victim s Packet Information and Instructions This packet should be completed once you have contacted Plymouth Township Police Department and obtained

More information

IDENTITY THEFT VICTIM S PACKET

IDENTITY THEFT VICTIM S PACKET DEPARTMENT OF PUBLIC SAFETY 1150 Canton Center S Canton, MI 48188-1699 John R. Santomauro, Director of Public Safety IDENTITY THEFT VICTIM S PACKET INFORMATION AND INSTRUCTIONS The purpose of this packet

More information

FRAUD PACKET. Instructions and Useful Information. Mesa Police Department Attention Financial Crimes PO Box 1466 Mesa, AZ 85211-1466

FRAUD PACKET. Instructions and Useful Information. Mesa Police Department Attention Financial Crimes PO Box 1466 Mesa, AZ 85211-1466 FRAUD PACKET Instructions and Useful Information Please read entire packet and follow instructions to complete this packet properly. **This packet should ONLY be completed if you are a victim of Identity

More information

How To File An Identity Theft Complaint And Affidavit

How To File An Identity Theft Complaint And Affidavit Average time to complete: 10 minutes Identity Theft Victims Complaint and Affidavit A voluntary form for filing a report with law enforcement and disputes with credit reporting agencies and creditors about

More information

Identity Theft Victims Universal Complaint Form (FTC)

Identity Theft Victims Universal Complaint Form (FTC) Average time to complete: 10 minutes A voluntary form for filing a report with law enforcement and disputes with credit reporting agencies and creditors about identity theft-related problems. Visit ftc.gov/idtheft

More information

York County Sheriff's Office Identity Theft Victim s Packet

York County Sheriff's Office Identity Theft Victim s Packet York County Sheriff's Office Identity Theft Victim s Packet Information and Instructions This packet should be completed once you have received a copy of your police report from the York County Sheriff's

More information

Avondale Police Department Identity Theft / Fraud / Forgery Victim's Packet

Avondale Police Department Identity Theft / Fraud / Forgery Victim's Packet Avondale Police Department Identity Theft / Fraud / Forgery Victim's Packet Information and Instructions This packet should be completed once you have contacted the Avondale Police Department and obtained

More information

Instructions for Completing

Instructions for Completing Instructions for Completing the ID Theft Affidavit To make certain that you do not become responsible for any debts incurred by an identity thief, you must prove to each of the companies where accounts

More information

Identity Theft Victim s Packet

Identity Theft Victim s Packet Identity Theft Victim s Packet Information and Instructions This packet should be completed once you have contacted Chandler Police Department and obtained a police report number related to your identity

More information

Attention: AT&T Theft of Identity Fax No: 866-761-0538 Or. P.O. Box 2767 Houston, TX 77252-2767

Attention: AT&T Theft of Identity Fax No: 866-761-0538 Or. P.O. Box 2767 Houston, TX 77252-2767 Re: ATT Account Number: Balance Due Dear Thank you for contacting Southwest Credit regarding the above telephone account. Like you, we want to resolve your dispute regarding the account as soon as possible.

More information

MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009

MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009 MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009 Current Laws: Identity Crime: A person is guilty of identity

More information

ACCG Identity Theft Prevention Program. ACCG 50 Hurt Plaza, Suite 1000 Atlanta, Georgia 30303 (404)522-5022 (404)525-2477 www.accg.

ACCG Identity Theft Prevention Program. ACCG 50 Hurt Plaza, Suite 1000 Atlanta, Georgia 30303 (404)522-5022 (404)525-2477 www.accg. ACCG Identity Theft Prevention Program ACCG 50 Hurt Plaza, Suite 1000 Atlanta, Georgia 30303 (404)522-5022 (404)525-2477 www.accg.org July 2009 Contents Summary of ACCG Identity Theft Prevention Program...

More information

MISSOURI IDENTITY THEFT RANKING BY STATE: Rank 21, 67.4 Complaints Per 100,000 Population, 3962 Complaints (2007) Updated January 11, 2009

MISSOURI IDENTITY THEFT RANKING BY STATE: Rank 21, 67.4 Complaints Per 100,000 Population, 3962 Complaints (2007) Updated January 11, 2009 MISSOURI IDENTITY THEFT RANKING BY STATE: Rank 21, 67.4 Complaints Per 100,000 Population, 3962 Complaints (2007) Updated January 11, 2009 Current Laws: A person commits the crime of identity theft if

More information

ILLINOIS IDENTITY THEFT RANKING BY STATE: Rank 11, 80.2 Complaints Per 100,000 Population, 10304 Complaints (2007) Updated November 30, 2008

ILLINOIS IDENTITY THEFT RANKING BY STATE: Rank 11, 80.2 Complaints Per 100,000 Population, 10304 Complaints (2007) Updated November 30, 2008 ILLINOIS IDENTITY THEFT RANKING BY STATE: Rank 11, 80.2 Complaints Per 100,000 Population, 10304 Complaints (2007) Updated November 30, 2008 Current Laws: A person commits the offense of identity theft

More information

Prepared for Members and Committees of Congress

Prepared for Members and Committees of Congress Prepared for Members and Committees of Congress Œ œ Ÿ In the wake of the economic downturn, policymakers are increasingly concerned with securing the economic health of the United States including combating

More information

[FACILITY NAME] IDENTITY THEFT PREVENTION PROGRAM. Effective May 1, 2009

[FACILITY NAME] IDENTITY THEFT PREVENTION PROGRAM. Effective May 1, 2009 [FACILITY NAME] IDENTITY THEFT PREVENTION PROGRAM Effective May 1, 2009 Because [FACILITY NAME] offers and maintains covered accounts, as defined by 16 C.F.R. Part 681 (the Regulations ), [FACILITY NAME]

More information

Identity Theft Victim s Packet

Identity Theft Victim s Packet Identity Theft Victim s Packet Information and Instructions This packet is to be completed once you have contacted the Ottawa County Sheriff s Office and obtained a complaint number related to your identity

More information

Identity Theft Victim s Packet

Identity Theft Victim s Packet Identity Theft Victim s Packet Information and Instructions This packet is to be completed once you have contacted the El Paso Police Department and obtained a police report number related to your identity

More information

Instructions for Completing the ID Theft Affidavit

Instructions for Completing the ID Theft Affidavit Instructions for Completing the ID Theft Affidavit To make certain that you do not become responsible for any debts incurred by an identity thief, you must prove to each of the companies where accounts

More information

PRIVACY AND IDENTITY THEFT 2003:

PRIVACY AND IDENTITY THEFT 2003: PRIVACY AND IDENTITY THEFT 2003: Where Are We Now And Where Are We Going.... Huggins v. CitiBank: A Case Study Stephen P. Groves, Sr., Esquire 205 King Street, Suite 400 Charleston, South Carolina 29401

More information

Protecting the Rights of Victims of Identity Theft

Protecting the Rights of Victims of Identity Theft Protecting the Rights of Victims of Identity Theft II Congreso Internacional del Derecho de los Mercados Bogotá, Colombia Marzo 2015 The views expressed in this presentation are mine and are not necessarily

More information

Identity Theft Victim s Complaint and Affidavit

Identity Theft Victim s Complaint and Affidavit Average time to complete: 10 minutes Identity Theft Victim s Complaint and Affidavit A voluntary form for filing a report with law enforcement, and disputes with credit reporting agencies and creditors

More information

An Introduction to Identity Theft. Letbighelptoday.com. Your Free Copy

An Introduction to Identity Theft. Letbighelptoday.com. Your Free Copy An Introduction to Identity Theft Your Free Copy DO I NEED IDENTITY THEFT INSURANCE? Necessary Coverage or False Sense of Security? Identity theft has become a national concern, with 10 million victims

More information

MISSISSIPPI IDENTITY THEFT RANKING BY STATE: Rank 32, 57.3 Complaints Per 100,000 Population, 1673 Complaints (2007) Updated December 21, 2008

MISSISSIPPI IDENTITY THEFT RANKING BY STATE: Rank 32, 57.3 Complaints Per 100,000 Population, 1673 Complaints (2007) Updated December 21, 2008 MISSISSIPPI IDENTITY THEFT RANKING BY STATE: Rank 32, 57.3 Complaints Per 100,000 Population, 1673 Complaints (2007) Updated December 21, 2008 Current Laws: A person shall not obtain or attempt to obtain

More information

PROGRAM TO PREVENT, DETECT & MITIGATE IDENTITY THEFT

PROGRAM TO PREVENT, DETECT & MITIGATE IDENTITY THEFT Office of Employee Benefits Administrative Manual PROGRAM TO PREVENT, DETECT & MITIGATE IDENTITY THEFT 150 EFFECTIVE DATE: AUGUST 1, 2009 REVISION DATE: PURPOSE: Ensure that the Office of Employee Benefits

More information

OREGON IDENTITY THEFT RANKING BY STATE: Rank 20, 68.1 Complaints Per 100,000 Population, 2552 Complaints (2007) Updated January 10, 2009

OREGON IDENTITY THEFT RANKING BY STATE: Rank 20, 68.1 Complaints Per 100,000 Population, 2552 Complaints (2007) Updated January 10, 2009 OREGON IDENTITY THEFT RANKING BY STATE: Rank 20, 68.1 Complaints Per 100,000 Population, 2552 Complaints (2007) Updated January 10, 2009 Current Laws: A person commits the crime of identity theft if the

More information

Updated Administration Proposal: Law Enforcement Provisions

Updated Administration Proposal: Law Enforcement Provisions Updated Administration Proposal: Law Enforcement Provisions [Changes to existing law are in shown in italics, bold, and strikethrough format] SEC. 101. Prosecuting Organized Crime Groups That Utilize Cyber

More information

Investigation and Prosecution of Identity Theft

Investigation and Prosecution of Identity Theft Investigation and Prosecution of Identity Theft In an effort to assist you in dealing with problems related to Identity Theft, the Menomonee Falls Police Department has prepared this packet of information

More information

Identity Theft Packet

Identity Theft Packet BOULDER POLICE DEPARTMENT 1805 33 rd Street Boulder, CO 80301 Identity Theft Packet ** Use this packet when the crime involves the stealing of someone's identity, such as when a victim finds out that someone

More information

WASHINGTON IDENTITY THEFT RANKING BY STATE: Rank 13, 76.4 Complaints Per 100,000 Population, 4942 Complaints (2007) Updated January 11, 2009

WASHINGTON IDENTITY THEFT RANKING BY STATE: Rank 13, 76.4 Complaints Per 100,000 Population, 4942 Complaints (2007) Updated January 11, 2009 WASHINGTON IDENTITY THEFT RANKING BY STATE: Rank 13, 76.4 Complaints Per 100,000 Population, 4942 Complaints (2007) Updated January 11, 2009 Current Laws: Washington s identity theft law states that no

More information

Identity Theft Regulation. *Christine Stagnetto-Sarmiento, Oglala Lakota College, USA. *Corresponding Author, 490 Piya Wiconi Road-Kyle, South Dakota

Identity Theft Regulation. *Christine Stagnetto-Sarmiento, Oglala Lakota College, USA. *Corresponding Author, 490 Piya Wiconi Road-Kyle, South Dakota 1 Identity Theft Regulation *Christine Stagnetto-Sarmiento, Oglala Lakota College, USA *Corresponding Author, 490 Piya Wiconi Road-Kyle, South Dakota (605) 455-6110 csarmiento@olc.edu Introduction This

More information

Chapter 6 Appendix A

Chapter 6 Appendix A Chapter 6 Appendix A Instructions for Completing the Norwalk Department of Police Service ID Theft Affidavits Please complete the attached form and submit it to the Police Department so that a case can

More information

ID Theft Toolkit and Affidavit

ID Theft Toolkit and Affidavit ID Theft Toolkit and Affidavit Identification Theft Toolkit Safeguard yourself from ID Theft ID Theft the unauthorized and illegal use of your name, Social Security number or other personal information

More information

UNIVERSITY OF CALIFORNIA, MERCED Red Flag and Security Incident Reporting Policy

UNIVERSITY OF CALIFORNIA, MERCED Red Flag and Security Incident Reporting Policy UNIVERSITY OF CALIFORNIA, MERCED Red Flag and Security Incident Reporting Policy RESPONSIBLE OFFICIAL : Executive Vice Chancellor/Provost RESPONSIBLE OFFICIAL : Business & Financial Services EFFECTIVE

More information

2006 National Community Policing Conference Identity Theft: Investigation and Prevention Tools July 27, 2006 Joanna Crane, FTC IDT Program

2006 National Community Policing Conference Identity Theft: Investigation and Prevention Tools July 27, 2006 Joanna Crane, FTC IDT Program 2006 National Community Policing Conference Identity Theft: Investigation and Prevention Tools July 27, 2006 Joanna Crane, FTC IDT Program IDT Surveys - FTC 2003/Javelin 2006 Annual Rates & Cost of Identity

More information

SUBJECT: Identity Theft / Patient Misidentification POLICY NUMBER: Page 1 of 16 GENERATED BY: Integrity Compliance Office APPROVED BY:

SUBJECT: Identity Theft / Patient Misidentification POLICY NUMBER: Page 1 of 16 GENERATED BY: Integrity Compliance Office APPROVED BY: SUBJECT: Identity Theft / Patient Misidentification POLICY NUMBER: ISSUED: 11/7/06 REVISED: 3/16/07; 5/6/08 (web reference updates only) Page 1 of 16 GENERATED BY: Integrity Compliance Office APPROVED

More information

Tips To Prepare. Audits/Investigations. For Prosecution

Tips To Prepare. Audits/Investigations. For Prosecution Tips To Prepare Audits/Investigations For Prosecution Presented By: Assistant State Attorney Sheri Maxim Thirteenth Judicial System Hillsborough County Florida Maxim_s@sao13th.com 813-274-1324 Topics of

More information

Scope All [Name of Facility] operations

Scope All [Name of Facility] operations Scope All [Name of Facility] operations Purpose To describe the measures to be followed when health care is obtained under a fictitious name or in another person s name. This includes situations when a

More information

July 2004. Short term and extended term fraud alerts, Short term and extended term active duty alerts,

July 2004. Short term and extended term fraud alerts, Short term and extended term active duty alerts, FEDERAL AND STATE IDENTITY THEFT PROTECTION LAWS Elizabeth A. Huber, Esq. Hudson Cook, LLP 2361 Rosecrans Ave., Suite 355 El Segundo, CA 90245 Telephone 310-536-9099 Fax 310-536-7644 Email: ehuber@hudco.com

More information

Selected Text of the Fair Credit Reporting Act (15 U.S.C. 1681 1681v) With a special Focus on the Impact to Mortgage Lenders

Selected Text of the Fair Credit Reporting Act (15 U.S.C. 1681 1681v) With a special Focus on the Impact to Mortgage Lenders Selected Text of the Fair Credit Reporting Act (15 U.S.C. 1681 1681v) as Amended by the Fair and Accurate Credit Transactions Act of 2003 (Public Law No. 108-159) With a special Focus on the Impact to

More information

Identity Theft Affidavit

Identity Theft Affidavit Identity Theft Affidavit VICTIM INFORMATION 1. My full legal name is: (First) (Middle) (Last) (Suffix: Jr., Sr., III) 2. (If different from above) When the events described in this affidavit took place,

More information

COMPUTER FRAUD AND ABUSE ACT. US Code as of: 01/05/99 Title 18 Sec. 1030. Fraud and related activity in connection with computers

COMPUTER FRAUD AND ABUSE ACT. US Code as of: 01/05/99 Title 18 Sec. 1030. Fraud and related activity in connection with computers COMPUTER FRAUD AND ABUSE ACT US Code as of: 01/05/99 Title 18 Sec. 1030. Fraud and related activity in connection with computers (a) Whoever - (1) having knowingly accessed a computer without authorization

More information

Agency Information Collection Activities: REAL ID: Minimum Standards for Driver s

Agency Information Collection Activities: REAL ID: Minimum Standards for Driver s This document is scheduled to be published in the Federal Register on 05/11/2016 and available online at http://federalregister.gov/a/2016-11133, and on FDsys.gov 9110-9B DEPARTMENT OF HOMELAND SECURITY

More information

IDENTITY THEFT PREVENTION PROGRAM

IDENTITY THEFT PREVENTION PROGRAM IDENTITY THEFT PREVENTION PROGRAM Concordia Board of Regents May 2009 A Resolution Adopting the Identity Theft Prevention Program WHEREAS, The Federal Trade Commission, under Part 681 of Title 16 in the

More information

Instructions for Completing the ID Theft Affidavit

Instructions for Completing the ID Theft Affidavit Instructions for Completing the ID Theft Affidavit To make certain that you do not become responsible for the debts incurred by the identity thief, you must provide proof that you didn t create the debt

More information

IDENTITY THEFT PREVENTION PROGRAM

IDENTITY THEFT PREVENTION PROGRAM IDENTITY THEFT PREVENTION PROGRAM In compliance with Part 681 of Title 16 of the Code of Federal Regulations implementing Sections 114 of the Fair and Accurate Credit Transactions Act of 2003 ("FACTA"),

More information

Rising Tide: The Explosion of Identity Theft During Hard Economic Times

Rising Tide: The Explosion of Identity Theft During Hard Economic Times Rising Tide: The Explosion of Identity Theft During Hard Economic Times Locating Services for Victims Paula Pierce Managing Attorney Victims Initiative for Counseling Advocacy and Restoration of the Southwest

More information

IDENTITY THEFT AFFIDAVIT INSTRUCTIONS

IDENTITY THEFT AFFIDAVIT INSTRUCTIONS IDENTITY THEFT AFFIDAVIT INSTRUCTIONS To make certain that you do not become responsible for the debts incurred by the identity thief, you must provide proof that you did not create the debt to each of

More information

OKLAHOMA LAWS RELATING TO IDENTITY THEFT

OKLAHOMA LAWS RELATING TO IDENTITY THEFT OKLAHOMA LAWS RELATING TO IDENTITY THEFT Prepared for VICARS by Legal Aid Services of Oklahoma Introduction: OKLAHOMA LAWS RELATING TO IDENTITY THEFT Identity theft takes place when someone uses your personal

More information

Instructions for Completing the ID Theft Affidavit

Instructions for Completing the ID Theft Affidavit Instructions for Completing the ID Theft Affidavit To make certain that you do not become responsible for the debts incurred by the identity thief, you must provide proof that you didn t create the debt

More information

Identity Theft/Credit Fraud Kit

Identity Theft/Credit Fraud Kit Provided by: Your source for information on Credit Reports and Credit Scores, where you can also safely order your own 3 Bureau Credit Report online that includes your credit information from Equifax,

More information

BUSINESS AND COMMERCE CODE PERSONAL IDENTITY INFORMATION UNAUTHORIZED USE OF IDENTIFYING INFORMATION

BUSINESS AND COMMERCE CODE PERSONAL IDENTITY INFORMATION UNAUTHORIZED USE OF IDENTIFYING INFORMATION BUSINESS AND COMMERCE CODE TITLE 11. PERSONAL IDENTITY INFORMATION SUBTITLE B. IDENTITY THEFT CHAPTER 521. UNAUTHORIZED USE OF IDENTIFYING INFORMATION SUBCHAPTER A. GENERAL PROVISIONS Sec. 521.001.AASHORT

More information

What follows are various form letters that can be adapted to your

What follows are various form letters that can be adapted to your Form Letters What follows are various form letters that can be adapted to your own specific situation and used accordingly. It is prudent to send these letters by certified mail, return receipt requested,

More information

Federal Trade Commission Overview of th e Identity Theft Program

Federal Trade Commission Overview of th e Identity Theft Program REPORT Federal Trade Commission Overview of th e Identity Theft Program October 1998 - September 2003 September 2003 FTC Identity Theft Program In 1998, Congress enacted the Identity Theft and Assumption

More information

IDENTITY THEFT IN SOUTH CAROLINA: 2014 UPDATE. Marti Phillips, Esq. Director, Identity Theft Unit South Carolina Department of Consumer Affairs

IDENTITY THEFT IN SOUTH CAROLINA: 2014 UPDATE. Marti Phillips, Esq. Director, Identity Theft Unit South Carolina Department of Consumer Affairs IDENTITY THEFT IN SOUTH CAROLINA: 2014 UPDATE Marti Phillips, Esq. Director, Identity Theft Unit South Carolina Department of Consumer Affairs This presentation is not meant to serve as a substitute for

More information

IDENTITY THEFT VICTIMS: IMMEDIATE STEPS

IDENTITY THEFT VICTIMS: IMMEDIATE STEPS IDENTITY THEFT VICTIMS: IMMEDIATE STEPS If you are a victim of identity theft, take the following four steps as soon as possible, and keep a record with the details of your conversations and copies of

More information

2009 CALIFORNIA IDENTITY THEFT MATRIX 1 Some overlooked or underused statutes

2009 CALIFORNIA IDENTITY THEFT MATRIX 1 Some overlooked or underused statutes 2009 CALIFORNIA IDENTITY THEFT MATRIX 1 Some overlooked or underused statutes Crime Title P.C. 2 Punishment 3 Elements 4 False Personation 529 Falsely personates another 5 in either his or her private

More information

Identity Theft Prevention and Security Breach Notification Policy. Purpose:

Identity Theft Prevention and Security Breach Notification Policy. Purpose: Identity Theft Prevention and Security Breach Notification Policy Purpose: Lahey Clinic is committed to protecting the privacy of the Personal Health Information ( PHI ) of our patients and the Personal

More information

Cybercrime: A Sketch of 18 U.S.C. 1030 and Related Federal Criminal Laws

Cybercrime: A Sketch of 18 U.S.C. 1030 and Related Federal Criminal Laws Order Code RS20830 Updated February 25, 2008 Cybercrime: A Sketch of 18 U.S.C. 1030 and Related Federal Criminal Laws Summary Charles Doyle Senior Specialist American Law Division The federal computer

More information

Milford Police Department

Milford Police Department Identity Theft Packet Information and Instructions This packet is to be completed once you have contacted Milford Police Department and obtained a police report number related to your identity theft case.

More information

Identity Theft: Consumers, Creditors & Criminals Civil and Criminal Enforcement 1

Identity Theft: Consumers, Creditors & Criminals Civil and Criminal Enforcement 1 Identity Theft: Consumers, Creditors & Criminals Civil and Criminal Enforcement 1 By Elizabeth A. Huber, Esq. 2 Hudson Cook, LLP Over the past two years, California s legislature has adopted a number of

More information

CALIFORNIA IDENTITY THEFT RANKING BY STATE: Rank 2, 120.1 Complaints Per 100,000 Population, 43,892 Complaints (2007) Updated November 25, 2008

CALIFORNIA IDENTITY THEFT RANKING BY STATE: Rank 2, 120.1 Complaints Per 100,000 Population, 43,892 Complaints (2007) Updated November 25, 2008 CALIFORNIA IDENTITY THEFT RANKING BY STATE: Rank 2, 120.1 Complaints Per 100,000 Population, 43,892 Complaints (2007) Updated November 25, 2008 Current Laws: A person who, with the intent to defraud, acquires

More information

Identity Theft Prevention Program

Identity Theft Prevention Program Identity Theft Prevention Program Illinois College of Optometry Illinois Eye Institute Effective Date: May 2009 Revised: Review Dates: IDENTITY THEFT PREVENTION POLICY STATEMENT The Illinois College of

More information

Frequently Asked Questions: Identity Theft Red Flags and Address Discrepancies

Frequently Asked Questions: Identity Theft Red Flags and Address Discrepancies Frequently Asked Questions: Identity Theft Red Flags and Address Discrepancies The staff of the Board of Governors of the Federal Reserve System (FRB), Federal Deposit Insurance Corporation (FDIC), National

More information

Policies and Procedures: IDENTITY THEFT PREVENTION

Policies and Procedures: IDENTITY THEFT PREVENTION Policies and Procedures: IDENTITY THEFT PREVENTION Section: Chapter: Policy: Compliance Administration Identity Theft Prevention I. PURPOSE The purpose of this policy is to protect patients and West Virginia

More information

WASHINGTON ASSOCIATION OF SHERIFFS AND POLICE CHIEFS Model Policy on Identity Theft Policy, Procedures, and Victim Referral Information

WASHINGTON ASSOCIATION OF SHERIFFS AND POLICE CHIEFS Model Policy on Identity Theft Policy, Procedures, and Victim Referral Information WASHINGTON ASSOCIATION OF SHERIFFS AND POLICE CHIEFS Model Policy on Identity Theft Policy, Procedures, and Victim Referral Information Definition - Identity theft is the wrongful appropriation of an individual

More information

Instructions for Completing the ID Theft Affidavit

Instructions for Completing the ID Theft Affidavit Instructions for Completing the ID Theft Affidavit To make certain that you do not become responsible for the debts incurred by the identity thief, you must provide proof that you didn t create the debt

More information

DHHS POLICIES AND PROCEDURES

DHHS POLICIES AND PROCEDURES DHHS POLICIES AND PROCEDURES Section VIII: Privacy and Security Identity Theft Policies, Identity Theft Red Flags and Address Discrepancy Identity Theft Policies Current Effective 2/1/16, 10/1/15 Date:

More information

Law Enforcement Officer Division of Privacy and Identity Protection The Federal Trade Commission Importance of Identity Theft Report

Law Enforcement Officer Division of Privacy and Identity Protection The Federal Trade Commission Importance of Identity Theft Report MEMORANDUM To: From: Re: Law Enforcement Officer Division of Privacy and Identity Protection The Federal Trade Commission Importance of Identity Theft Report The purpose of this memorandum is to explain

More information

POHATCONG TOWNSHIP POLICE DEPARTMENT

POHATCONG TOWNSHIP POLICE DEPARTMENT POHATCONG TOWNSHIP POLICE DEPARTMENT FRAUD / I.D. THEFT PRELIMINARY REPORT ID Theft / Fraud Affidavit Victim Information 1. My full legal name is (First) (M.) (Last) (suffix) 2. (If different from above)

More information

Chapter No. 911] PUBLIC ACTS, 2004 1 CHAPTER NO. 911 HOUSE BILL NO. 3403

Chapter No. 911] PUBLIC ACTS, 2004 1 CHAPTER NO. 911 HOUSE BILL NO. 3403 Chapter No. 911] PUBLIC ACTS, 2004 1 CHAPTER NO. 911 HOUSE BILL NO. 3403 By Representatives Hargrove, Curtiss, Todd, Kent, DuBois, McDonald, Bittle, Marrero and Mr. Speaker Naifeh Substituted for: Senate

More information

NORTHEAST COMMUNITY COLLEGE ADMINISTRATIVE PROCEDURE NUMBER: AP-3250.0 FOR POLICY NUMBER: BP 3250 IDENITY THEFT PREVENTION PROGRAM PROCEDURES

NORTHEAST COMMUNITY COLLEGE ADMINISTRATIVE PROCEDURE NUMBER: AP-3250.0 FOR POLICY NUMBER: BP 3250 IDENITY THEFT PREVENTION PROGRAM PROCEDURES NORTHEAST COMMUNITY COLLEGE ADMINISTRATIVE PROCEDURE NUMBER: AP-3250.0 FOR POLICY NUMBER: BP 3250 IDENITY THEFT PREVENTION PROGRAM PROCEDURES 1. PROCEDURE SUMMARY STATMENT The purpose of this procedure

More information

Gauging the Effectiveness of U.S. Identity Theft Legislation. (Article Forthcoming, 2006 in the Journal of Financial Crime)

Gauging the Effectiveness of U.S. Identity Theft Legislation. (Article Forthcoming, 2006 in the Journal of Financial Crime) Gauging the Effectiveness of U.S. Identity Theft Legislation (Article Forthcoming, 2006 in the Journal of Financial Crime) Key Words: Identity theft, legislation, prevention Robert E. Holtfreter, Ph.D.

More information

Identity Theft. What it is and How to Protect Yourself

Identity Theft. What it is and How to Protect Yourself Mark R. Herring Attorney General Commonwealth of Virginia Office of the Attorney General 900 East Main Street Richmond, Virginia 23219 (804) 786-2071 (Telephone) (804) 786-1991 (Facsimile) Identity Theft

More information

H. R. To amend titles 17 and 18, United States Code, to strengthen the protection of intellectual property, and for other purposes.

H. R. To amend titles 17 and 18, United States Code, to strengthen the protection of intellectual property, and for other purposes. F:\SLS\SLS_.XML 0TH CONGRESS D SESSION H. R. To amend titles and, United States Code, to strengthen the protection of intellectual property, and for other purposes. IN THE HOUSE OF REPRESENTATIVES M. introduced

More information